Analysis
-
max time kernel
125s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08-08-2023 21:33
Static task
static1
1 signatures
General
-
Target
7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe
-
Size
1.7MB
-
MD5
c906f5482d2a7d1f0ff3e6f3a945e27c
-
SHA1
23f3894f3d3ef6bca88def2ff3320471b309d940
-
SHA256
7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7
-
SHA512
ed9378c87541df0cd0516864f122d9866d3d8e1d65921df851576a409d6d503d3084e49cd3247ee62072a59d12a1a128ee07fc7936ff9e925e1b11d9c88312b2
-
SSDEEP
12288:ANVV/rGvaRlb2nZS1dUpSp3fHwS6K68ZaAouhdKiIXZam:MVQPnZSXUpShfQxKy9urDgam
Malware Config
Signatures
-
ParallaxRat payload 19 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/4108-130-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-135-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-136-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-137-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-138-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-139-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-140-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-141-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-142-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-143-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-144-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-145-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-146-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-147-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-148-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-149-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-150-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-151-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat behavioral1/memory/4108-152-0x0000000000400000-0x000000000042C000-memory.dmp parallax_rat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\obwure.exe DllHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\obwure.exe DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 972 wrote to memory of 3824 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 71 PID 972 wrote to memory of 3824 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 71 PID 972 wrote to memory of 3824 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 71 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72 PID 972 wrote to memory of 4108 972 7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe"C:\Users\Admin\AppData\Local\Temp\7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe"2⤵PID:3824
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\7d746e96a8c98fa35f66b7033350d5c800b7b9e0982409995bbdefa93c1a1cb7.exe"2⤵PID:4108
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- Drops startup file
PID:4164